Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet protocol security decryption with secondary use speculative interrupts

a technology of speculative interrupts and network protocols, applied in the field of encrypted networks, can solve problems such as reducing the throughput of the system, requiring the execution of numerous cpu cycles, and requiring the latency of received data

Active Publication Date: 2007-11-20
INTEL CORP
View PDF14 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when implemented in software, the algorithms used for encryption, decryption, and authentication of the data for IPSec require execution of numerous CPU cycles.
This configuration adds latency to received data reaching the application, thereby decreasing the throughput of the system.
An extra interrupt is often required to perform these transfers across the bus.
However, such interrupts increase CPU utilization.
Furthermore, the extra latency introduced can degrade throughput of protocols that are sensitive to the round trip time of packets, such as TCP.
However, Inline Receive is more expensive to implement because the keys and matching information for cryptography operations must be stored on the network interface in an SA cache.
Due to such limitations, the INTEL PRO / 100 S Server Adapter, for example, supports only a limited number of connections that can use Inline Receive.
The primary source of the increased latency for Secondary Use is the delay related to the final interrupt of the Secondary Use operation.
Early ingress interrupts have been used on low speed buses where the transfer operation was expensive.
With the advent of busmasters in peripheral component interconnect (“PCI”), this use of early interrupts for any traffic has become scarce.
This utilization, in turn, reduces the packet rate that can be processed, further reducing or eliminating the utility of the interrupt coalescing algorithms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet protocol security decryption with secondary use speculative interrupts
  • Internet protocol security decryption with secondary use speculative interrupts
  • Internet protocol security decryption with secondary use speculative interrupts

Examples

Experimental program
Comparison scheme
Effect test

example 1

Determination of Average Interrupt Handler Latency

[0027]Decryption engines process data at a rate of approximately 600 Megabits per second (“Mbit / sec”). The latency from the device Interrupt Request line (“IRQ”) to interrupt processing is based on measurements on INTEL PENTIUM III Processor and INTEL PENTIUM 4 Processor systems using a MICROSOFT WINDOWS 2000 Operating System. Notably, the value of this latency does not change significantly with processor speed.

[0028]The latency effect on TCP peak throughput is based on the bandwidth-delay product. Thus, maximum TCP throughput is the quotient of the receiver's window size divided by round trip time. The round trip time for a connection can be estimated from the latency values in Table 1; the latency values being doubled to account for the return of an acknowledgement. Assuming few or no infrastructure delays, and a 64K byte receiver's window (largest currently allowed without window scaling), the maximum throughput is estimated.

[0029...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for improved decryption performance includes a computer in electronic communication with an encrypted network. A controller performs a decryption operation on an encrypted packet received from the network, and the computer asserts an interrupt prior to the system completing transfer of the decrypted packet back to host memory to reduce the additional latency a packet suffers during Secondary Use. An additional interrupt may be asserted after the Secondary Use operation is complete, to ensure that the Secondary Use packet is processed. A method for improving decryption performance similarly includes asserting an interrupt prior to the complete transfer of a decrypted packet from a controller back to host memory during Secondary Use. The method may further include asserting an additional interrupt after the Secondary Use operation is complete, to ensure that the Secondary Use packet is processed.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention generally relates to encrypted networks. More particularly, the present invention relates to a system and method for improving the performance of an encrypted network by asserting interrupts to reduce latency that packets suffer during Secondary Use.[0003]2. Discussion of the Related Art[0004]Internet Protocol Security (“IPSec”) is employed to protect both the confidentiality and integrity of data that is transferred on a network. Because IPSec provides a way to encrypt and decrypt data below the transport layer (e.g., Transmission Control Protocol, “TCP” or User Datagram Protocol, “UDP”), the protection is transparent to applications that transfer data. Thus, no alterations are required at the application level in order to utilize IPSec. However, when implemented in software, the algorithms used for encryption, decryption, and authentication of the data for IPSec require execution of numerous CPU ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06
CPCH04L63/0428H04L2463/102H04L63/08
Inventor CONNOR, PATRICK LMINNICK, LINDEN
Owner INTEL CORP